Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-0226

Опубликовано: 17 июл. 2014
Источник: redhat
CVSS2: 6.8
EPSS Критический

Описание

Race condition in the mod_status module in the Apache HTTP Server before 2.4.10 allows remote attackers to cause a denial of service (heap-based buffer overflow), or possibly obtain sensitive credential information or execute arbitrary code, via a crafted request that triggers improper scoreboard handling within the status_handler function in modules/generators/mod_status.c and the lua_ap_scoreboard_worker function in modules/lua/lua_request.c.

A race condition flaw, leading to heap-based buffer overflows, was found in the mod_status httpd module. A remote attacker able to access a status page served by mod_status on a server using a threaded Multi-Processing Module (MPM) could send a specially crafted request that would cause the httpd child process to crash or, possibly, allow the attacker to execute arbitrary code with the privileges of the "apache" user.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Directory Server 8httpdUnder investigation
Red Hat JBoss Enterprise Application Platform 5httpdNot affected
Red Hat JBoss Enterprise Web Server 1httpdWill not fix
Red Hat JBoss Enterprise Web Server 1othersNot affected
Red Hat Enterprise Linux 5httpdFixedRHSA-2014:092023.07.2014
Red Hat Enterprise Linux 6httpdFixedRHSA-2014:092023.07.2014
Red Hat Enterprise Linux 7httpdFixedRHSA-2014:092123.07.2014
Red Hat JBoss Enterprise Application Platform 6.3httpdFixedRHSA-2014:102106.08.2014
Red Hat JBoss Enterprise Application Platform 6 for RHEL 5apache-commons-beanutils-eap6FixedRHSA-2014:101906.08.2014
Red Hat JBoss Enterprise Application Platform 6 for RHEL 5apache-commons-cli-eap6FixedRHSA-2014:101906.08.2014

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-662->CWE-122
https://bugzilla.redhat.com/show_bug.cgi?id=1120603httpd: mod_status heap-based buffer overflow

EPSS

Процентиль: 100%
0.91096
Критический

6.8 Medium

CVSS2

Связанные уязвимости

ubuntu
около 11 лет назад

Race condition in the mod_status module in the Apache HTTP Server before 2.4.10 allows remote attackers to cause a denial of service (heap-based buffer overflow), or possibly obtain sensitive credential information or execute arbitrary code, via a crafted request that triggers improper scoreboard handling within the status_handler function in modules/generators/mod_status.c and the lua_ap_scoreboard_worker function in modules/lua/lua_request.c.

nvd
около 11 лет назад

Race condition in the mod_status module in the Apache HTTP Server before 2.4.10 allows remote attackers to cause a denial of service (heap-based buffer overflow), or possibly obtain sensitive credential information or execute arbitrary code, via a crafted request that triggers improper scoreboard handling within the status_handler function in modules/generators/mod_status.c and the lua_ap_scoreboard_worker function in modules/lua/lua_request.c.

debian
около 11 лет назад

Race condition in the mod_status module in the Apache HTTP Server befo ...

github
больше 3 лет назад

Race condition in the mod_status module in the Apache HTTP Server before 2.4.10 allows remote attackers to cause a denial of service (heap-based buffer overflow), or possibly obtain sensitive credential information or execute arbitrary code, via a crafted request that triggers improper scoreboard handling within the status_handler function in modules/generators/mod_status.c and the lua_ap_scoreboard_worker function in modules/lua/lua_request.c.

fstec
около 11 лет назад

Уязвимость программного обеспечения Apache HTTP Server, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 100%
0.91096
Критический

6.8 Medium

CVSS2

Уязвимость CVE-2014-0226